000 01613nam a22002177a 4500
999 _c1361
_d1361
005 20211224131033.0
008 211224b ||||| |||| 00| 0 eng d
020 _a0849319587
020 _a9780849319587
082 _a005.8
_bPEI
100 _aPeltier, Thomas R.
245 _aInformation security policies and procedures : a practitioner's reference
_cThomas R Peltier
250 _a2nd ed.
260 _aBoca Raton, FL :
_bAuerbach Publications,
_c©2004.
300 _axxiii, 384 pages :
_billustrations, map ;
_c25 cm
505 _tWhy manage this process as a project? --
_tPlanning and preparation --
_tDeveloping policies --
_tAsset classification policy --
_tDeveloping standards --
_tDeveloping procedures --
_tCreating a table of contents --
_tUnderstanding how to sell policies, standards, and procedures.
520 _aInformation Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies.
650 _aComputer security
650 _aData protection
942 _2ddc
_cG